Thursday , February 21 2019

March, 2018

  • 1 March

    Hacking Bluetooth

    Hacking Bluetooth

    Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and …

February, 2018

  • 28 February

    Working with Email

    Working with Email

    Working with Email: Email is one of the tools that a business relies on today to get its mission done. Without email many businesses would have serious trouble functioning in anything approaching a normal manner. The contents of email are staggering and can be extremely valuable to an attacker looking …

  • 27 February

    The Value of Job Sites

    The Value of Job Sites

    The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites and job postings. If you have every looked at a job posting, as many of us have, you will notice that they can take a lot of forms, but something …

  • 26 February

    Using a Honeypot in Practice

    Using a Honeypot in Practice

    Honeypot in Practice: A honeypot is ideally suited to get a clearer picture of the activity on or around the critical systems in your environment. The common use of honeypots is to look like a legitimate resource so as to be indistinguishable from the real thing. This will subject both …

  • 25 February

    Biometrics: Installing Biometric Devices

    Biometrics: Installing Biometric Devices

    Biometrics: Biometrics systems use some kind of unique biological trait to identify a person, such as fingerprint, patterns on the retina, and handprints. Some methods that are used include hand scanners, retinal scanners, facial recognition applications, and keystroke recognition programs, which can be used as part of the access control …

  • 24 February

    Directory Traversal/Command Injection

    Directory Traversal Command Injection

    Directory Traversal and Command Injection: If an attacker is able to gain access to restricted directories (such as the root directory) through HTTP, it is known as a directory traversal attack. If the attackers can gain access to the root directory of a system (which is limited from all but …

  • 23 February

    Malicious Add-Ons

    Malicious Add-Ons

    Malicious Add-Ons: There are any numbers of add-ons that have the potential to harm a system. Some do so unintentionally through poor programming, and some are truly malicious add-ons; the difference between them is intent. Consider a Java applet, for example. This is a small, self-contained Java Script that is …

  • 22 February

    Antimalware

    Antimalware

    Antimalware: To keep all hosts safe from malware, there are a number of actions you should take at minimum: Install Antivirus Software: Access Control, Authentication, and Authorization, Should be installed and definitions kept current on all hosts. Antivirus software should run on the server as well as on every workstation. …

  • 21 February

    Smart Cards

    Smart Cards

    Smart Cards are generally used for access control and security purposes. The card itself usually contains a small amount of memory that can be used to store permissions and access information. Smart cards are difficult to counterfeit, but they are easy to steal. Once a thief has a smart card, …

  • 20 February

    Wi-Fi Encryption

    Wi-Fi Encryption

    Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share the same key, using symmetric encryption, and RC4 was mentioned for this purpose earlier in articles. Since all the clients and the access point share the same key, this is …